While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatic ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a tar ...more
If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more
Microsoft Office files can be password-protected in order to prevent tampering and ensure data integrity. But password-protected documents from earlier versions of Office are susceptible to having their hashes extracted with a simple program called office2john. Those extracted ...more
Hi there, nullbytes :) I've recently seen many questions regarding VMs with Kali, and personally I prefer using a Live Boot USB to get Kali without removing my system (and for many reasons). Some of the reasons for using a Live USB are: · You use all of your system resources ...more
While Touch ID has been a part of the iPhone's legacy since 2013, Apple waited until 2016 to add biometrics to its MacBook lineup, and it's not as impressive. An iPhone with Touch ID can register up to five fingerprints, but Macs can only register a maximum of three per accoun ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB d ...more
You're in a Zoom meeting, and you're click-clacking away at your keyboard, typing important notes from the call. More realistically, you're doing something unrelated to the meeting, such as browsing the web, playing a game, or messaging friends. Whatever it is you're typing, i ...more
Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal the ...more
Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites. Continuing on the topics of DPI evasion, payload obfuscat ...more
Surveying a target's Wi-Fi infrastructure is the first step to understanding the wireless attack surface you have to work with. Wardriving has been around since the '90s and combines GPS data and Wi-Fi signal data to create accurate, in-depth maps of any nearby Wi-Fi networks ...more
While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the system are similarly tech-savvy. We'll demonstrate how an evil twin attack can steal Wi-Fi passwords by kicking a user off their trusted network while creating a nearly identical fake one ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
For me, the idea of a smartphone with internet access was overkill for a cell phone. Wasn't that what my computer was for? Do I really need immediate access to the web? Must I update my Facebook every hour, from the palm of my hand? Do I need turn-by-turn directions from Googl ...more
Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more
Now that the iPhone 4 is on Verizon, there's an increasing number of ex-Android users wanting to know how to take a screenshot on their new iOS device. We all know what a nightmare it was to take a screenshot on your Android device. You had to download the Android SDK, enable ...more
Last weekend, some unlucky Gmail users inadvertently had their email accounts wiped out. Actually, it was 0.02 percent of all Gmail users—or roughly 40,000 of the 200 million who use the email service, due to an "unexpected bug" which affected copies of the data. Gmail does ma ...more
I was looking around on this site and this article caught my eye. It was about hiding text in ADS or Alternate Data Streams. While this is nothing new in the tech world, it seems that more and more people are looking at ADS for one reason or another. Years ago, I created a si ...more
Want to switch between various open applications via keyboard shortcut? With Mac OS X and the app switcher tool, it's a breeze. It's so easy, in fact, that this home-computing how-to can presenta complete overview of the process in just over two minutes. For more information, ...more
WPA-secured wireless networks, or WiFI Protected Access, is a form of internet security that secures your wireless LAN from being accessed by unauthorized users. Safer than WEP, or wireless equivalent privacy, WPA still has weaknesses that are prone to cracking - IF, that is, ...more
We're addicted to "True Blood." And, if we're going to be honest here, it's not just because the show has labyrinthine plot lines and exciting vampire vs. human vs. werewolf action. With hot chicks and hot guys, the show seems to be a breeding ground of good looks. And we're n ...more
Devolped by the same team of engineers responsible for LightWave 3D, modo, lowercase, delivers the next evolution of 3D modeling, painting and rendering in a single integrated and accelerated package for the Mac and PC. And now, modo is a true end-to-end solution that includes ...more
So, a lot of people seem to be having trouble rooting their Motorola Droid X smartphone from Verizon Wireless using ADB (Android Debug Bridge). Well, there is an alternative for those having problems with the ADB version. You will need to have a Wi-Fi or Bluetooth widget handy ...more
The first day of Hanukkah is here, the day you start lighting the candles of the menorah. So, why not ditch the wax and light the "lights" this year? (Skip ahead to see the LED menorah) Hanukkah is a Jewish festival that lasts eight days from the 25th day of Kislev, which th ...more
You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more
If you've rooted your Motorola Droid chances are that you are enjoying the results, but are concerned about the consequences if you phone updates or in any way become incapacitated since your phone manufacturer will not be pleased with what you've done to the phone. One way to ...more
This video explains how to use the Speech Recognition tool on the Mac, which allows you to speak most of the commands that you use on the computer. To enable speech recognition, go the Apple menu, select System Preferences and click on Speech. Then click on “On” next to Sp ...more
File recovery on Linux is a bit different than Windows. It requires different software than the Windows counterparts because every OS has their own file system. Windows uses NTFS, or FAT file systems, while on the other hand, Linux uses ext-based file systems. I personally use ...more
Are you playing Minecraft on a Mac? Would you like more functions and better performance from chat? Check out this video, you'll need to download Modloader and improved chat. You'll be able to bind keys, so that your most used commands are only a single keystroke away!
In this tutorial, we learn key commands that will allow you to sleep, restart or shutdown an Apple computer running the Mac OS X operating system. They're easy to use and remember and this video presents a complete guide. For more information, including a full demonstration an ...more
In this tutorial, we learn how to set up and use custom key commands on an Apple computer running the Mac OS X operating sytem. It's an easy process and this video presents a complete guide. For more information, including a full demonstration and detailed, step-by-step instru ...more
Interested in creating your own custom keyboard shortcuts within Mac OS X? It's easier than you might think. It's so easy, in fact, that this home-computing how-to can present a complete, head-to-toe overview of the process in just over a minute's time. For details, including ...more
Have you ever wanted to take a screenshot of your desktop to use in a presentation or to send to a coworker? In this video tutorial, Mac Genius Joy will show you how to take a picture of all, or part, of your screen with the Mac OS X key commands. For more, and to learn how to ...more
In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because the ...more
In this video tutorial, you'll learn how to use keyboard shortcuts within Google Gmail to speed up common and repetitive tasks. For all the details, including step-by-step instructions, and to get using these useful key commands yourself, take a look.
In this clip, you'll learn how to save time with a number of useful keyboard shortcuts for the Apple MacBook. They're easy! So easy, in fact, that this home-electronics how-to can present a complete overview of them in about five minutes. For more information, including detail ...more
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more
I've struggled for a long time trying to set up a virtual network between my KVM virtual machines. I tried several forums and tutorials on the web, but still on my system it just wouldn't work. I eventually got it owrking, so I've decided to make some notes of my own. Hopefull ...more
In this video tutorial, viewers learn how to burn a CD or DVD on a Mac computer with the Burn application. Burn is able to create data, audio and video discs. The Inspector window allows users to edit extra information about the disc. To open Inspector, press the Command and I ...more
This how to video shows you how to change the voice in the VoiceOver Utility program on a Mac. This will be useful if you want a voice that is more realistic or more understandable. First, open the program and choose the speech pane. On voices, click the drop down menu to choo ...more
The video is about how to use voice over in Safari for Mac OS X. To use Voice over it has to be enabled first. It can be used to read the entire html content on web page using short cut control + option + shift + Down Arrow. To move between different items on the web page use ...more
Mac users might be unwilling to ever trade in their beloved computers for a PC, but they might still want or even need to run certain Windows applications. Thanks to Boot Camp, you can install and run Windows on your Mac. If you install Windows x64 do this while Windows is st ...more
In this video tutorial, viewers learn how to eject and recover a stuck CD or DVD on a Mac computer. There are several ways to eject a disc. The first method is to click on File and select Eject. The second method is to press the Command and E buttons on the keyboard. The third ...more
The Apple Spotlight application in Mac OS X can do more than just searches for documents. Throughout your day, you may need to perform a calculation or look up a definition for a word. You can now do that directly from Spotlight. To acccess Spotlight, you can either click on t ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
Friday's mission was to accomplish solving HackThisSite, basic mission 7, which required us to learn some basic Unix commands. If you have any prior experience using Unix commands, this should be a breeze for you if you sit and think for a second. These missions are for every ...more
Linux can have the most beautiful interface in the world, because it is simply what you make of it. You can change every little detail with relative ease because that's what Linux is all about: Freedom and OpenSource. I posted pictures of my desktop on the corkboard a few wee ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install Zekr (Qur'an Study Tool) on Ubuntu Linux, Windows, and Mac OS. Zekr is an open platform Quran study tool for si ...more
Change your Snow Leopard dock on Mac OS X with this video tutorial. Go to Leopard Hard drive -> System folder -> Library folder -> CoreServices folder -> Dock App (right click) -> Show package contents -> Contents folder -> Resources folder -> Scroll down until you get to Scur ...more
Wouldn't it be handy if, while running Mac OS X, you could enlarge some of the fonts and applications like Mail or Safari? Some of those fonts can be relatively small. All you need to do to increase font size in an OS X application is to press the command, shift and plus keys. ...more
This is a short video tutorial from Stuart Little showing you how to move a layer mask between different layers. You can do it simply by holding down the Command key (for Macs) or Control key (for PCs) as you click and move the mask layer to the intended layers. Watch the vide ...more
Water Purification Device Prompts TSA to Close Down Minneapolis Airport In another stupendous incident of comical over-reaction, the TSA ordered the evacuation of two airport terminals in Minneapolis after a water purification device was found in a woman’s luggage. Obama Mul ...more
Bash (Shell) Scripting for Beginners Intro I am an occasional Linux user currently playing around in CrunchBang and loving it. Prior to this, I used to dual-boot Windows and xfce-buntu (or xubuntu) at work, and due to some unforeseen circumstances, my screen always went fuzz ...more
SSH is what is referred to as the Secure SHell protocol. SSH allows you to do a plethora of great things over a network, all while being heavily encrypted. You can make a remote accessible shell on your home computer that gives you access to all your files at home, and you can ...more
Warning Don't torrent things that you do not have the rights to torrent. Everything I torrent, I have a physical copy of, and just want a copy on my computer without causing wear-and-tear on my DVD drive's laser. Piracy is naughty. I used to get extremely frustrated with Bit ...more
This video tutorial from izbyfl shows how install Google Chrome and enable its plugins in Ubuntu. First download application from here: http://www.google.com/chrome/intl/en/eula_dev.html?dl=unstable_i386_deb. Make sure you download Gdebi Package Installer. Install applicati ...more
There is a near-infinite amount of ways a computer can be broken into. But that does not mean that there isn't a reason to secure our computers as best as we possibly can. It's like the principles of a secure house. Which are the most secure houses? The ones with locks and adv ...more
In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a frien ...more